US10754965B2 - Data messaging with privacy tokens - Google Patents
Data messaging with privacy tokens Download PDFInfo
- Publication number
- US10754965B2 US10754965B2 US15/453,537 US201715453537A US10754965B2 US 10754965 B2 US10754965 B2 US 10754965B2 US 201715453537 A US201715453537 A US 201715453537A US 10754965 B2 US10754965 B2 US 10754965B2
- Authority
- US
- United States
- Prior art keywords
- message
- data
- privacy indication
- privacy
- presentable
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 claims abstract description 68
- 238000004891 communication Methods 0.000 claims description 100
- 238000012790 confirmation Methods 0.000 claims description 16
- 230000008447 perception Effects 0.000 abstract 1
- 230000006870 function Effects 0.000 description 43
- 239000000203 mixture Substances 0.000 description 29
- 230000008569 process Effects 0.000 description 27
- 238000003860 storage Methods 0.000 description 13
- 238000010586 diagram Methods 0.000 description 10
- 238000012545 processing Methods 0.000 description 10
- 230000000007 visual effect Effects 0.000 description 5
- 238000004590 computer program Methods 0.000 description 4
- 238000003780 insertion Methods 0.000 description 4
- 230000037431 insertion Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000010365 information processing Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000003825 pressing Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 239000000872 buffer Substances 0.000 description 1
- 239000002775 capsule Substances 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G06T5/002—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration
- G06T5/70—Denoising; Smoothing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/146—Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/03—Arrangements for converting the position or the displacement of a member into a coded form
- G06F3/041—Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
-
- G06K9/00442—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V30/00—Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
- G06V30/40—Document-oriented image-based pattern recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0471—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying encryption by an intermediary, e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding
Definitions
- the present disclosure generally relates to communicating data messages between devices, and more particularly to sending messages indicating viewing protection by a receiver.
- presentation data is able to encode various types of presentable content, such as visual images, videos, other presentations that are audible, visual, sensible in other ways, or combinations of these, that an electronic device is able to present to a user, such on a visual display.
- Examples of another type of presentation data include audible presentations where the presentation data encodes sounds that can be reproduced by an electronic device.
- the contents of some presentations encoded by presentation data can be sensitive and it is sometimes desired to limit the mode of presenting such presentations so as to reduce the likelihood that the presentation can be unintentionally viewed, heard, or be otherwise provided to unintended persons.
- Such presentation data is able to be sent to others via various data messaging formats and the sender in some instances may wish to specify that presentations of the presentation data is protected from being provided to unintended persons.
- FIG. 1 illustrates a messaging environment, according to an example
- FIG. 2 illustrates a first message composer user interface, according to an example
- FIG. 3 illustrates a second message composer user interface, according to an example
- FIG. 4 illustrates a third message composer user interface, according to an example
- FIG. 5 illustrates a presentation privacy filter operation, according to an example
- FIG. 6 illustrates a message creation block diagram, according to an example
- FIG. 7 illustrates a message receiver processing block diagram, according to an example
- FIG. 8 illustrates a message reception process, according to an example
- FIG. 9 illustrates a message forwarding process, according to an example.
- FIG. 10 is a block diagram of an electronic device and associated components in which the systems and methods disclosed herein may be implemented.
- the terms “a” or “an”, as used herein, are defined as one or more than one.
- the term plurality, as used herein, is defined as two or more than two.
- the term another, as used herein, is defined as at least a second or more.
- the terms “including” and “having,” as used herein, are defined as comprising (i.e., open language).
- the term “coupled,” as used herein, is defined as “connected,” although not necessarily directly, and not necessarily mechanically.
- the term “configured to” describes hardware, software or a combination of hardware and software that is adapted to, set up, arranged, built, composed, constructed, designed or that has any combination of these characteristics to carry out a given function.
- the term “adapted to” describes hardware, software or a combination of hardware and software that is capable of, able to accommodate, to make, or that is suitable to carry out a given function.
- presentation data is able to include any type of data that is able to be perceived by a user of a device, such as text messages, images, audio, other perceivable data, or combinations of these.
- text messages images, audio, other perceivable data, or combinations of these.
- the below descriptions present examples that are based on systems and methods that exchange text messages as presentable content defined by presentation data that is communicated via any type of text messaging system.
- a sender is able to compose a text message.
- the sender is able to include a privacy indication token within the text message prior to sending the text message to a recipient.
- the privacy indication token is a particular user input pattern, such as a particular word, code such as an indication of an emoji, another code, other data, or combinations of these.
- the privacy indication token is contained within the body of the text message.
- the privacy indication token is able to be included as part of the normal operation of composing a message with a conventional message composition application or function.
- the below described systems and methods are able to be used by an unmodified conventional text messaging application by allowing the sender to insert keywords, particular emoji, other codes, or combinations of these, into the text message by using the conventional user input keyboard or other facilities. Inserting one or more of these items in some examples indicates that the message is to be presented with a presentation privacy filter at the receiving device.
- a text message or other message is able to be composed with a program, application, function, or other facility that recognizes when a privacy indication token has been inserted into the message by a user composing the message.
- the program, application, function, or other facility recognizes that a privacy indication token has been entered and a presentation privacy filter is automatically applied to the display of the message being composed.
- Particular privacy indication tokens in an example are able to be defined according to any technique.
- privacy indications tokens are able to be specified by a defined list programmed into devices exchanging such message, by configuration of specific patterns provided by a user of a device or other person, by any other technique, or by combinations of these.
- a suitable receiver of a text message operates to determine if a received text message includes a privacy indication token.
- the text message may contain a particular word or emoji code that the receiver is configured to recognize as a privacy indication token.
- the receiver Upon detecting such a privacy indication token, the receiver in an example applies a presentation privacy filter before ever displaying the text message.
- any suitable presentation privacy filter is able to be used.
- a presentation privacy filter that is used in the below described systems and methods is able to be any type of processing that is applied to content that obscures or renders a presentation of that content unintelligible to an observer.
- a presentation privacy filter obscures the entire image being presented on the display and allows a user to provide inputs to expose a portion of the content without being obscured.
- the presentation privacy filter receives an input, such as an object touching a point on a touch sensitive display, and based on receiving that input a small area of the obscured display is presented in an unobscured, clear form to allow the user to clearly view a portion of the displayed content.
- a presentation privacy filter operates by obscuring most of the image being presented on the display but leaves a relatively small portion of that image unobscured and in clear form even without any input by a user.
- a presentation privacy filter obscures the entire image being presented on the display and allows a user to provide inputs to expose a portion of the content without being obscured, as described above. However, in this example, the relatively small portion of that image unobscured and in clear form remains unobscured and in clear form after removal of the input, such as removal of an object touching the display.
- the above variations are able to be selected based upon any criteria, such as device configurations, enterprise policies, other criteria, or combinations of these.
- an input is then able to be received to move the small area presenting an unobscured, clear form of the image.
- movement of a point of contact of an object, such as a user's finger, on the screen is able to operate to expose other portions of the display.
- moving the contact point causes the previously exposed content near the earlier contact point to be obscured.
- a privacy display mode for displaying content is an example of a presentation privacy filter.
- a privacy display mode in an example allows users view private information in public places by obscuring portions of the screen that are not being actively viewed/used.
- a privacy display mode is able to be implemented by creating two presentation image layers.
- a first presentation image layer contains the contents to be presented, and a second presentation layer is an obscured version of the content to be presented.
- an initial presentation of content includes a presentation with the second presentation layer presented “over” the first presentation layer so as to obscure the first presentation layer.
- a mask or ‘hole’ is cut out of the second presentation layer, allowing the user to see through the blurring and obscuring. When the user lifts the finger from the screen, the content is then obscured again.
- a privacy display mode is able to obscure selected portions of the display by darkening those selected portions.
- an Organic Light Emitting Diode (OLED) display is able to not illuminate, e.g., “turn off,” portions of the display that are to be obscured while only illuminating the unobscured portions of the display that are to be exposed on the display.
- OLED Organic Light Emitting Diode
- various modes are able to be used to expose unobscured content when the user selects an area of the display, such as by touching the display at a location.
- a “word mode” or “circle mode” exposes an exposed portion of the content as a circular area or other area of unobscured content in an area near the user's touching of the display.
- a “line mode” exposes an exposed portion of the content as a horizontal line of a suitable height, such as a height corresponding to one line of text.
- a “partial mode” always leaves a portion of the display exposed while the remainder of the display is obscured.
- a “smear mode” exposes a first portion of an exposed portion and gradually obscures a remaining portion of the exposed portion outside of the first portion.
- the first portion in an example is selected by an input from a user, such as a touching of the screen, on the display and leaves it exposed for an interval of time.
- the “smear mode” allows portions of the display to be exposed by moving the selected location and thus exposing the content along the path where the user's finger touched within that time interval.
- a “typing mode” exposes a circle or other area around an insertion point in the content where the user is typing data. In an example, the exposed area in “typing mode” is obscured after a user types a particular character, such as a “space” character.
- Input mode is an example of “partial mode” that obscures all of the display except for a line that corresponds to an area of the display that presents text or other data that a user is presently inputting.
- an instant messaging application is able to operate by exposing only the last ‘part’ of the conversation, which is generally the portion that is of greater interest to the user (the size of the exposed portion could change with the height of newly received height).
- the rest of the conversation stays obscured unless explicitly revealed by touching the screen.
- “input mode” another mode, such as the above described “word mode,” “line mode,” “smear mode,” other modes,” or combinations of these, are able to be used for the remainder of the display outside of the “input” line that is exposed in “input mode.”
- a particular mode such as “word mode,” “line mode,” “smear mode,” other modes,” “input mode,” or combinations of these, are able to be selected by a user via any suitable technique.
- once a particular mode is selected that last choice is stored and used the next time information is to be presented with a privacy display mode.
- different selections are able to be individually stored and used for different applications, activities, display screens within applications, other conditions, or combinations of these.
- the amount of blurring, obscuring, darkening, other hiding effects, or combinations of these are able to be configurable.
- less blurring or other obscuring allows the content to faintly make out where content is present on the screen in order to determine where to touch the screen.
- the opacity around text and images could be 100% so the user would only see “blocks” of obscured content.
- the receiver is able to be configured to respond in various ways to messages that include privacy indication tokens.
- the receiver always applies the presentation privacy filter when presenting the presentable data, such as a text message, and does not allow the user to disable the presentation privacy filter.
- the receiver is able to be configured to prompt the user as to whether a presentation privacy filter is to be applied or if the content is to be presented clearly.
- the receiver is able to be configured to apply the presentation privacy filter when first presenting the content and then allow the user to disable to presentation privacy filter.
- a value of a privacy indication token included in a message may indicate restrictions on how a device is able to display presentable data in that message.
- a privacy indication token is able to indicate a minimum level of obfuscation to be applied when presenting the presentable data.
- one or more privacy indication tokens are able to indicate a maximum transparency value of a presentation privacy filter.
- a receiver is able to be configured to respond to a message that includes a particular privacy indication token value by interpreting the particular privacy indication token to specify that a maximum transparency value of 5% (which corresponds to minimum of 95% obfuscation) is to be applied when presenting the presentable data in the message.
- a sender is able to enforce a minimum level of privacy with presentations of presentable data.
- systems and methods described below are applicable to any type of device.
- these systems and methods are applicable to any type of electronic device that is able to be used in any type of operational environment.
- these systems and methods are able to be included in desktop systems, physically installed systems, other systems that are not intended to be frequently moved, or in combinations of these.
- these systems and methods can be incorporated into one or more of portable electronic devices, which include devices that are easily carried by a person or other carrier; or mobile devices including smartphones, tablets, phablets, wearable devices, and include devices mounted in movable systems such as vehicles of any type.
- these electronic devices are able to be located in vehicles that include, but are not limited to, motor vehicles (e.g., automobiles, cars, trucks, buses, motorcycles, etc.), aircraft (e.g., airplanes, unmanned aerial vehicles, unmanned aircraft systems, drones, helicopters, etc.), spacecraft (e.g., spaceplanes, space shuttles, space capsules, space stations, satellites, etc.), watercraft (e.g., ships, boats, hovercraft, submarines, etc.), railed vehicles (e.g., trains and trams, etc.), and other types of vehicles including any combinations of any of the foregoing, whether currently existing or after arising.
- motor vehicles e.g., automobiles, cars, trucks, buses, motorcycles, etc.
- aircraft e.g., airplanes, unmanned aerial vehicles, unmanned aircraft systems, drones, helicopters, etc.
- spacecraft e.g., spaceplanes, space shuttles, space capsules, space stations, satellites, etc.
- watercraft
- These electronic devices are also able to include fixed devices, which include devices that are not designed to be easily or often relocated such as desktop electronic equipment; other types of electronic equipment, or combinations of these.
- Other examples of devices include an endpoint device, IoT (Internet of Things) device, EoT (Enterprise of Things) device, etc.
- FIG. 1 illustrates a messaging environment 100 , according to an example.
- the messaging environment 100 depicts a number of communications device users who are exchanging messages via wireless data communications.
- the messaging environment 100 includes a wireless network 130 that allows various wireless communications devices to communicate with one another.
- the messaging environment 100 depicts the wireless network 130 as a single tower, it is clear that various wireless networks are able to include any number of communications towers, transceivers, other equipment, various wireless communications technologies, or combinations of these.
- communications devices are able to communicate over wired communications, combinations of wired and wireless communications, any suitable communications network, or combinations of these.
- the messaging environment 100 includes a first user 102 with a first communications device 110 and a second user 104 with a second communications device 112 .
- the first communications device 110 has wireless communications with the wireless network 130 via a first wireless link 120 and the second communications device 112 has wireless communications with the wireless network 130 via a second wireless link 122 .
- the first user 102 is using the first communications device 110 to send a message 132 to the second communications device 112 via the wireless network 130 .
- the message 132 in this example is a text message such as may be communicated via a Short Messaging Service (SMS) protocol, via any other text messaging protocol, via any type of application, or via combinations of these.
- SMS Short Messaging Service
- the message 132 is able to be any type of message communicated between or among electronic communications devices.
- the message 132 conveys presentable content which is a text message directed to the second user 104 .
- the message 132 in this example includes presentable data that includes data defining that text message content that is intended to be presented to the second user 104 .
- the text of the message is the presentable content.
- the presentable data that defines the presentable content within the message 132 does not include the data contained within the message 132 that is used to support communications.
- presentable data does not include one or more of message addressing data, data communications channel support information such as status flags or other communications protocol supporting data, data other than content to be presented to the user of the receiving communications device, or combinations of these.
- the first user 102 is able to insert a privacy indication token into the message 132 prior to sending that message 132 .
- the privacy indication token in the message 132 in an example causes the second communications device 112 to apply a presentation privacy filter when displaying the presentable data contained within the message 132 .
- a presentation privacy filter in an example obscures or obfuscates the presentable content so that it is not normally intelligible by a viewer.
- the presentation privacy filter allows a user to select a portion of the content to be clearly presented.
- the presentation privacy filter may blur, cloud, blank or otherwise obscure, the text so that it cannot be read.
- the user interface may allow a user to select a portion of the display that will be clearly presented, such as a “spotlight” within the darkened or blurred presented image.
- the messaging environment 100 depicts a third user 106 with a third communications device 114 and a fourth user 108 with a fourth communications device 116 .
- the third communications device 114 in this example has wireless communications with the wireless network 130 via a third wireless link 124 and the fourth communications device 116 has wireless communications with the wireless network 130 via a fourth wireless link 126 .
- the second user 104 receives the message 132 on the second communications device 112 and decides to forward that message, as a forwarded message 134 , to the third communications device 114 and the fourth communications device 116 .
- the second communications device 112 is configured to ensure that the privacy indication token that the sender, i.e., the first user 102 in this example, inserted into the presentable data is retained within the presentable data of the forwarded message 134 .
- the second communications device may be configured to allow removal of the privacy indication token under certain conditions, such as after prompting for and receiving a confirmation by the user of his or her intention to remove the privacy indication token.
- the privacy indication token inserted by the original sender, e.g., the first user 102 , into the presentable data may indicate to a receiving device whether the privacy indication token may be removed by the receiver, or if its removal is prohibited.
- FIG. 2 illustrates a first message composer user interface 200 , according to an example.
- the first message composer user interface 200 is an example of a user interface provided to a user of a text messaging application in order to create a message that contains a privacy indication token.
- the first message composer user interface 200 depicts a communications device 202 with a display 204 .
- the communications device 202 is an example of the first communications device 110 discussed above.
- User inputs provided to control operations of communications device 202 in various examples are able to be provided by any suitable technique.
- display 204 is able to be a touch sensitive screen that allows a user to enter data by contacting a particular portion of the display 204 .
- user input is able to be provided by any suitable technique, such as by user input devices to manipulate user interface elements presented on display 204 .
- the illustrated display 204 includes a first text composition window 210 into which a user is able to enter text to be sent to another device.
- the user has entered a text message 208 that includes “HI—HERE IS A MESSAGE BETWEEN US.”
- this text is presentable content that is encoded into presentable data contained in a message sent by the communications device 202 .
- the display 204 illustrated in this example is a touch sensitive display that allows a user to select options by touching a graphical display element, such as a labeled button.
- the illustrated display 204 includes a SEND button 214 and a MARK TO HIDE button 212 .
- the communications device 202 sends the contents in the first text composition window 210 when the user selects, such as by touching, the SEND button 214 .
- a user in this example Prior to sending the message, a user in this example is able to cause the text messaging application to insert a privacy indication token into the text message.
- the user in this example is able to select, such as by pressing the graphical user interface element, the MARK TO HIDE button 212 .
- this button is selected in an example, a suitable privacy indication token is inserted into the textual data of the message.
- the privacy indication token is able to be any code or data, printable or non-printable, that can be encoded into the presentable data to be sent by the message sent by the communications device 202 .
- insertion of the privacy indication token into the message causes a presentation privacy filter to be applied to the presentation of content in the first text composition window 210 .
- a presentation privacy filter is described in further detail below.
- the MARK TO HIDE button 212 is able to toggle between inserting privacy indication token and removing the privacy indication token once the privacy indication has been inserted.
- the first text composition window 210 may not initially contain a privacy indication token.
- the MARK TO HIDE button 212 is able to be configured to remove the privacy indication token.
- the label of the MARK TO HIDE button 212 may change to, for example, MARK TO UNHIDE. Removal of the privacy indication token, such as by selecting a MARK TO UNHIDE button, by other techniques, or combinations of these, in some examples causes the MARK TO HIDE button 212 to resume it function to insert a privacy indication token as is described above.
- a privacy indication token is able to be inserted in response to any operation of other inputs or controls or the communications device 202 .
- a privacy indication token is inserted into a message being composed when an input is received to enable a presentation privacy filter on the communications device 202 .
- the user is able to cause a presentation privacy filter to be applied to the display 204 .
- the processing within the communications device 202 determines that an input to apply a presentation privacy filter to the display 204 presenting the message being composed, and inserts a privacy indication token into the message.
- processing monitors for an input to disable the presentation privacy filter and removes the privacy indication token if such an input is detected before sending that message.
- an inserted privacy indication token is not removed upon detection of an input to disable the presentation privacy filter on the display 204 .
- FIG. 3 illustrates a second message composer user interface 300 , according to an example.
- the second message composer user interface 300 is similar to the above described first message composer user interface 200 but does not include the MARK TO HIDE button 212 .
- the second message composer user interface 300 is similar in some cases to a conventional text messaging user interface.
- a user is able to use a conventional text messaging application to compose and send a text message that includes a privacy indication token to a suitable destination communications device.
- the display 204 includes a second text composition window 310 into which the user is able to enter text to be sent to another device.
- the second text composition window 310 is similar to the first text composition window 210 in that a user is able to enter a text message by using various user input devices.
- the user in this example has entered a second text message 304 into the second text composition window 310 which includes the above described text message 208 “HI—HERE IS A MESSAGE BETWEEN US” and also includes a special text keyword 302 .
- the special text keyword 302 in this example is the word SECRET, in capital letters.
- the user is able to simply type the word SECRET directly into the second text composition window 310 in order to insert a privacy indication token into the text of the message to be sent.
- the special text keyword 302 SECRET is a privacy indication token.
- communications devices to which the communications device 202 sends messages are configured to determine that the text content of the message includes the special text keyword 302 SECRET.
- Such communications devices are further configured to apply a presentation privacy filter when displaying text messages that include a special text keyword.
- a user of the second message composer user interface 300 is able to send messages that will automatically be displayed with a presentation privacy filter when they are received by a suitably configured communications device.
- insertion of the privacy indication token into the message causes a presentation privacy filter to be applied to the presentation of content in the second text composition window 310 .
- a presentation privacy filter is described in further detail below.
- a composition window is able to have a presentation privacy filter applied when a message is to be protected.
- a device is able to be configured to recognize when a privacy indication token is entered by any suitable technique into a message, including those described above, and respond by automatically applying a presentation privacy filter to the display of the message being composed, created, edited, modified, or otherwise presented on the composing device.
- applying the presentation privacy filter is performed without explicit user action beyond causing the privacy indication token to be inserted into the message.
- FIG. 4 illustrates a third message composer user interface 400 , according to an example.
- the third message composer user interface 400 is similar to the above described second message composer user interface 300 and includes the same user interface components.
- the third message composer user interface 400 contains third text message 404 into the third text composition window 410 , which includes the above described text message 208 “HI—HERE IS A MESSAGE BETWEEN US” but includes a special emoji token 402 .
- the special emoji token 402 in this example is a stylized “X” or cross, which reflects that presentation of the text message 208 is to be restricted by receiving devices by a presentation privacy filter.
- user interface of the communications device 202 allows entry of the special emoji token 402 by any suitable technique.
- the user interface may have a selection of emoji characters that include the special emoji token 402 , the user is able to enter a character sequence that will indicate that the special emoji token 402 is to be inserted into the text message, by any other technique, or combinations of these.
- a standard emoji character such as are specified by various Unicode standards as defined by the Unicode Consortium.
- the special emoji token 402 is an example of a privacy indication token.
- communications devices to which the communications device 202 sends messages are configured to determine that the text content of the message includes the special emoji token 402 and will apply a presentation privacy filter when displaying text messages that include such a special emoji token 402 .
- a user of the third message composer user interface 400 is also able to send messages that will automatically be displayed with a presentation privacy filter when they are received by a suitably configured communications device.
- insertion of the privacy indication token into the message causes a presentation privacy filter to be applied to the presentation of content in the third text composition window 410 .
- a presentation privacy filter is described in further detail below.
- FIG. 5 illustrates a presentation privacy filter operation 500 , according to an example.
- the presentation privacy filter operation 500 depicts five example states of a presentation of a received text message that is obscured by a presentation privacy filter.
- the text of the text message is an example of presentable content that is encoded into the data of a message received by a device.
- the below described presentations are presented based on a received message with presentable data that includes the text message 208 discussed above and also either the special text keyword 302 or the special emoji token 402 .
- the receiver detected the presence of one or more privacy indication tokens, such as the special text keyword 302 or the special emoji token 402 , and applied the below described presentation privacy filter.
- the presentation privacy filter operations 500 depicts various techniques for clearly presenting exposed portions of content that is otherwise obscured by a presentation privacy filter.
- a first presentation privacy filter state 502 depicts a completely obscured presentation 510 .
- a presentation privacy filter is able to obscure visual presentable content by, for example, blurring or presenting an unfocused image, presenting an image to which random or pseudo-random visual “noise” is added, by presenting an image that darkens or “blanks” portions that are to be obscured, by any other technique, or by combinations of these.
- a second presentation privacy filter state 504 depicts a first partially exposed presentable content 512 .
- the first partially exposed presentable content 512 is similar to the completely obscured presentation 510 except that a first exposed portion 520 of the presentable content is presented in clear form while the remainder of the presentation remains obscured.
- the presentation privacy filter is operating in a circle mode whereby a circular region is presented in clear form.
- a presentation privacy filter is able to operate in a line mode whereby an exposed portion that consists of a line is displayed.
- the height and width of the line is able to be based on any suitable criteria, such as a line that is an entire length of the presentation, any other width, or combinations of these.
- a user is able to specify the location of the first exposed portion 520 by any suitable technique.
- a user is able to touch a touch sensitive screen presenting the totally obscured presentation 510 at a location and the first exposed portion 520 is presented at or near the location of that touch.
- other user interface facilities such as a trackball, trackpad, arrow buttons, other user interface devices, or combinations of these, are able to be used to specify, move, or specify and move, a location of the first exposed portion 520 . In such a manner, a user is able to expose different portions of the entire message that is obscured in the completely obscured presentation.
- the illustrated first exposed portion 520 is shown as a circle.
- other modes such as the above described “line mode” or “smear mode” is alternatively able to be used to present the first exposed portion.
- a third presentation privacy filter state 506 depicts a second partially exposed presentable content 514 .
- the second partially exposed presentable content 514 is similar to the first partially exposed presentable content 512 except that a second exposed portion 522 of the presentable content is presented at a different location than the first exposed portion 520 .
- the second exposed portion 522 depicts an example of a movement of the first exposed portion by, for example, a user dragging his or her finger from a location at or close to the first exposed portion 520 to a location at or close to the second exposed portion 522 .
- the second exposed portion 522 also uses that selected mode to present the exposed portion.
- the depicted second exposed portion 522 is also a circle, as is depicted for the first exposed portion 522 discussed above.
- a fourth presentation privacy filter state 508 depicts a third partially exposed presentable content 516 .
- the third partially exposed presentable content 516 includes a third exposed portion 524 that operates in “smear mode.” As discussed above, smear mode exposes unobscured content in areas selected by the user, such as being touched, of the display and leaves them exposed for an interval of time. The “smear mode” allows portions of the display to be exposed by moving the selected location and thus exposing the content along the path where the user's finger touched within that time interval.
- the third exposed portion 524 shows the same clearly text, “IS A,” as is presented in the second exposed portion 522 .
- the third exposed portion 524 also presents some text to the left of the “IS A” that is gradually being re-obscured.
- the text within the third exposed portion 524 is “HERE IS A” with the “HE” being obscured more than the “RE.”
- a fifth presentation privacy filter state 509 depicts a fourth partially exposed presentable content 518 .
- the fourth partially exposed presentable content 519 includes a fourth exposed portion 526 that operates in “line mode” or “input mode.”
- “input mode” operates by obscuring all of the display except for a line that corresponds to an area of the display that presents text or other data that a user is presently inputting.
- the depicted fourth exposed portion is an example of such an area of the display that has the most recently altered information.
- the last ‘part’ of the conversation is exposed, which is the last line of the presently viewed message.
- FIG. 6 illustrates a message creation block diagram 600 , according to an example.
- the message creation block diagram 600 depicts a message composition function 602 and various sources of data provided to that function.
- the message composition function 602 is an example of a function that presents and maintains the first message composer user interface 200 , second message composer user interface 300 , and third message composer user interface 400 described above.
- the message composition function 602 creates message datasets and sends them to a data transmitter 612 for transmission to destination devices.
- the operation of the message composition function 602 in an example is based on data received from a configuration data store 604 .
- the configuration data store 604 in an example includes specifications of rules to be applied to messages that are composed by the message composition function 602 .
- the configuration data store 604 may specify that messages sent to certain addresses are to always include a privacy indication token.
- the configuration data store 604 is able to specify that privacy indication tokens contained in received messages are not able to be removed when forwarding the message.
- the configuration data store 604 is able to specify that a subset of defined privacy indication token values are not able to be removed when forwarding the messages but other privacy indication token values are able to be removed.
- the message composition function 602 receives user input and provides presentations to a user via a user interface 606 .
- user interface 606 include one or more of keyboards, trackpads, trackballs, touch screen displays, keyboards presented on touch screen displays, other user interfaces, or combinations of these.
- the user interface 606 is able to present a table of emojis that includes one or more special emoji tokens as are described above.
- the message composition function 602 operates to receive input data via a user input of the user interface 606 .
- the input data is used to compose a message that includes presentable data defining presentable content where the input data includes or specifies the presentable content.
- the user interface 606 in an example includes a display that the message composition function 602 controls to present a presentation of the presentable content based on receiving the input data.
- the message composition function 602 determines a presence of a privacy indication token within the input data and applies, based on determining the presence of the privacy indication token within the input data, a presentation privacy filter to the presentation of the presentable content on the display of the user interface 606 .
- the message composition function 602 in an example receives definitions of privacy indication tokens 608 . These definitions are used, for example by the first message composer user interface 200 , where a privacy indication token is inserted into a text message after selecting the MARK TO HIDE button 212 . These definitions are also used in an example when forwarding a message to determine which data is not able to be removed from the forwarded message.
- the message composition function 602 is further able in some examples to receive operating parameters from enterprise policies 610 .
- Enterprise policies 610 in an example are defined by Information Technology departments of an enterprise and specify restrictions or other defined operating modes for the message composition function 602 . For example, restrictions on forwarding messages that contain a privacy indication token are able to be specified by the enterprise policies.
- Enterprise policies 610 in an example are contained within an enterprise policy definition set that is maintained by a processor in communications with a processor implementing the message composition function 602 .
- FIG. 7 illustrates a message receiver processing block diagram 700 , according to an example.
- the message receiver processing block diagram 700 depicts components within a data receiver.
- the message receiver processing block diagram 700 depicts a message receipt function 702 and various sources of data received by that function as well as functions that receive data from the message receipt function 702 .
- the message receipt function 702 is an example of a message receipt processor.
- the message receipt function 702 in an example receives messages from a data transceiver 710 .
- the data transceiver 710 receives data messages that were composed by and sent from the components of the above described message creation block diagram 600 .
- the operation of the message receipt function 702 in an example is based on specifications contained within configuration data 712 and enterprise policies 714 .
- one or both of the configuration data 712 or enterprise policies 714 contain specifications of privacy indication tokens.
- Enterprise policies 714 in an example are contained within a enterprise policy definition set that is maintained by a processor in communications with a processor implementing the message receipt function 702 .
- enterprise policies definition sets include specifications of limitations on an ability to remove privacy indication tokens from presentable data within messages.
- the message receipt function 702 processes received messages to determine if the message contains one or more privacy indication tokens. As described below, the message receipt function 702 restricts certain aspects of processing messages that include one or more privacy indication tokens. If the message does contain a privacy invitation token, the message receipt function 702 passes the message data to a presentation privacy filter 704 .
- the presentation privacy filter 704 processes the presentation data to obscure a presentation on a display 706 of the content defined by that presentation data in a manner such as is described above with regards to the presentation privacy filter operation 500 . If the presentation data contained in the message is determined to not contain a privacy indication token, the data within the message is able to be presented directly and in full on the display 706 .
- the configuration data 712 , enterprise policies 714 , or both are able to specify that a user of the device on which the message receipt function 702 is operating is able to override the presentation restrictions normally associated with a privacy indication token.
- a user is able to select, such as via a user interface facility, that a user may disable the application of a presentation privacy filter even though the message includes a privacy indication token.
- such disabling may be restricted to after the message is initially displayed with a presentation privacy filter, or such disabling is able to be the used to initially present a message without a presentation privacy filter.
- User interface 708 is able to be used to control various operations of the message receipt function 702 .
- a user may indicate a command to forward a received message to other recipients via inputs to the user interface 708 .
- the user interface 708 is also able to be used to control operation of the presentation privacy filter, such as by specifying a location of, and movement of, the above described first exposed portion 520 on the display.
- FIG. 8 illustrates a message reception process 800 , according to an example.
- the message reception process 800 is an example of a process performed by the above described message receipt function 702 .
- the message reception process 800 receives, at 802 , a message with presentable data that defines presentable content.
- a text message is an example of a message with presentable data that defines the presentable content, which is the text of the text message.
- Further examples of messages with presentable data include one or more of messages that include text data, image data, audible data, other data that defines content that can be presented to a user, or combinations of these.
- the message reception process 800 determines, at 804 , if the presentable data includes a privacy indication token.
- a privacy indication token that can be included in presentable data include, but are not limited to, the above described special text keyword 302 and special emoji token 402 . If it is determined that a privacy indication token is not included in the presentable data, the presentable content defined by the presentable data data is presented, at 806 , and the message reception process 800 end.
- the message reception process 800 applies, at 810 , a presentation privacy filter to the presentable data.
- the presentation privacy filter operation 500 depicts an example of a suitable presentation privacy filter.
- the message reception process 800 presents, at 812 , the presentable content defined by the presentation data with the presentation privacy filter applied.
- this presentation includes allowing a user to select one or more exposed areas of the presentation in which a portion of the presented presentation content is clearly visible. This presentation further allows a user to move the location of such one or more exposed area to allow the user to clearly view different portions of the presentable content.
- the message reception process 800 then ends.
- FIG. 9 illustrates a message forwarding process 900 , according to an example.
- the message forwarding process 900 depicts processing performed upon received messages.
- the message forwarding process 900 is performed after the message reception process 800 , discussed above, is performed to initially present the presentation content conveyed by the received message.
- the message forwarding process 900 receives, at 902 , a message with presentable data that includes a privacy indication token.
- the message forwarding process 900 then receives a request, at 904 , to remove the privacy indication token.
- This request in an example is able to be received from a user via, e.g., the user interface 708 described above.
- the message forwarding process 900 or other components within the message receipt function 702 described above, operate to limit an ability to remove privacy indication tokens from the presentable data.
- this determination as to whether removal of the privacy indication token is allowed is also able to be made based upon the value of the privacy indication token, such as in cases where some values are defined to allow removal and other values are defined to prohibit removal. If removal is allowed, the token is removed, at 908 . Upon removal of the privacy indication token at this point, the user is able to view a presentation of the presentable content without a presentation privacy filter at any time, forward the message with the privacy indication token, perform other operations upon the message, or combinations of these.
- the message forwarding process 900 receives, at 910 , a request to forward the message without the privacy indication token.
- a request is able to be received via, for example, the user interface 708 described above.
- a determination, at 916 is made as to whether forwarding of the message without the token requires confirmation by the user. Such confirmation is able to limit unintended forwarding of messages that contain a privacy indication token where the forwarded message would have that token removed. In some examples, such a determination is based upon configuration data 712 , enterprise policies 714 , values of the privacy indication tokens, other sources, or combinations of these. If confirmation is required, a prompt for conformation is made, at 920 . A determination of whether confirmation is provided is performed at 922 . If confirmation is not provided, the request is rejected, at 924 , and the message forwarding process 900 ends.
- the message is forwarded, at 930 .
- the message forwarding process 900 then ends.
- FIG. 10 is a block diagram of an electronic device and associated components 1000 in which the systems and methods disclosed herein may be implemented.
- the electronic device 1052 in this example is a wireless two-way communication device with one or more of the following: voice, text, and data communication capabilities.
- Such electronic devices communicate with a wireless voice, text, or data network 1050 using a suitable wireless communications protocol.
- Wireless voice communications may be performed using either an analog or digital wireless communication channel.
- Data communications allow the electronic device 1052 to communicate with other computer systems via the Internet.
- Examples of electronic devices that are able to incorporate the above described systems and methods include, for example, a data messaging device, a two-way pager, a cellular telephone with text and data messaging capabilities, a wireless Internet appliance or a data communication device that may or may not include telephony capabilities.
- the illustrated electronic device 1052 is an example electronic device that includes two-way wireless communications functions. Such electronic devices may incorporate communication system elements such as a wireless transmitter 1010 , a wireless receiver 1012 , and associated components such as one or more antenna elements 1014 and 1016 .
- a digital signal processor (DSP) 1008 performs processing to extract data from received wireless signals and to generate signals to be transmitted.
- DSP digital signal processor
- the particular design of the communication system may be dependent upon the communication network and associated wireless communications protocols with which the device is intended to operate.
- the electronic device 1052 includes a microprocessor 1002 that controls the overall operation of the electronic device 1052 .
- the microprocessor 1002 interacts with the above described communications system elements and also interacts with other device systems.
- the electronic device 1052 is able to include one or more of various components such as a flash memory 1006 , random access memory (RAM) 1004 , auxiliary input/output (I/O) device 1038 , data port 1028 , display 1034 , keyboard 1036 , earpiece 1032 , audio sound reproduction system 1070 , microphone 1030 , a short-range communications system 1020 , a power system 1022 , other systems, or combinations of these.
- RAM random access memory
- I/O auxiliary input/output
- One or more power storage or supply elements are connected to a power system 1022 to provide power to the circuits of the electronic device 1052 .
- the power system 1022 includes power distribution circuitry for providing power to the electronic device 1052 and also contains battery charging circuitry to manage recharging the battery 1024 (or circuitry to replenish power to another power storage element).
- the power system 1022 receives electrical power from external power supply 1054 .
- the power system 1022 is able to be connected to the external power supply 1054 through a dedicated external power connector (not shown) or through power connections within the data port 1028 .
- the power system 1022 includes a battery monitoring circuit that is operable to provide a status of one or more battery status indicators, such as remaining capacity, temperature, voltage, electrical current consumption, and the like, to various components of the electronic device 1052 .
- the data port 1028 is able to support data communications between the electronic device 1052 and other devices through various modes of data communications, such as high speed data transfers over an optical communications circuits.
- Data port 1028 is able to support communications with, for example, an external computer or other device.
- the data port 1028 is able to include electrical power connections to provide externally provided electrical power to the electronic device 1052 , deliver electrical power from the electronic device 1052 to other externally connected devices, or both.
- Data port 1028 of, for example, an electronic accessory is able to provide power to an electronic circuit, such as microprocessor 1002 , and support exchanging data between the microprocessor 1002 and a remote electronic device that is connected through the data port 1028 .
- Data communication through data port 1028 enables a user to set preferences through the external device or through a software application and extends the capabilities of the device by enabling information or software exchange through direct connections between the electronic device 1052 and external data sources rather than via a wireless data communication network.
- the data port 1028 provides power to the power system 1022 to charge the battery 1024 or to supply power to the electronic circuits, such as microprocessor 1002 , of the electronic device 1052 .
- Operating system software used by the microprocessor 1002 is stored in flash memory 1006 .
- flash memory 1006 are able to include, for example, flash memory, magnetic based storage devices, other volatile or non-volatile data store elements, or the like. Some examples are able to use flash memory 1006 that includes a battery backed-up RAM or other non-volatile storage data elements to store operating systems, other executable programs, or both.
- the operating system software, device application software, or parts thereof, are able to be temporarily loaded into volatile data storage such as RAM 1004 . Data received via wireless communication signals or through wired communications are also able to be stored to RAM 1004 .
- the microprocessor 1002 in some examples are able to execute program components, such as is able to be defined in flash memory 1006 in one example, that cause the microprocessor 1002 to perform the above described processes and methods.
- the microprocessor 1002 in addition to its operating system functions, is able to execute software applications on the electronic device 1052 .
- programs and other data used to support the processes described above are able to be installed in the memory of the electronic device 1052 .
- Further examples of applications that are able to be loaded onto the device may be a personal information manager (PIM) application having the ability to organize and manage data items relating to the device user, such as, but not limited to, e-mail, calendar events, voice mails, appointments, and task items.
- PIM personal information manager
- the applications are able to include the above described base applications, which may be installed during manufacture or from another trusted and verified source, along with user applications that may be installed at any time.
- Further applications may also be loaded onto the electronic device 1052 through, for example, the wireless network 1050 , an auxiliary I/O device 1038 , Data port 1028 , short-range communications system 1020 , or any combination of these interfaces. Such applications are then able to be installed by a user in the RAM 1004 or a non-volatile store for execution by the microprocessor 1002 .
- a received signal such as a text message or web page download is processed by the communication system, including wireless receiver 1012 and wireless transmitter 1010 , and communicated data is provided the microprocessor 1002 , which is able to further process the received data.
- the electronic device 1052 includes a display, output ports, or combinations of these. In such examples, the received data is able to be processed for output to the display 1034 , or alternatively, to an auxiliary I/O device 1038 or the Data port 1028 .
- a user of the electronic device 1052 may also compose data items, such as e-mail messages, using the keyboard 1036 , which is able to include a complete alphanumeric keyboard or a telephone-type keypad, in conjunction with the display 1034 and possibly an auxiliary I/O device 1038 . Such composed items are then able to be transmitted over a communication network through the communication system.
- voice communications For voice communications, overall operation of the electronic device 1052 is substantially similar, except that received signals are generally provided to an earpiece 1032 and signals for transmission are generally produced by a microphone 1030 .
- Alternative voice or audio I/O systems such as a voice message recording system, may also be implemented on the electronic device 1052 .
- voice or audio signal output is generally accomplished primarily through the earpiece 1032 , in examples of electronic devices 1052 that include a display 1034 , the display 1034 may also be used to provide an indication of the identity of a calling party, the duration of a voice call, or other voice call related information, for example.
- one or more particular functions associated with a system circuit may be disabled, or an entire system circuit may be disabled. For example, if the battery temperature is low, then voice functions may be disabled, but data communications, such as e-mail, may still be enabled over the communication system.
- a short-range communications system 1020 provides for data communication between the electronic device 1052 and different systems or devices, which need not necessarily be similar devices.
- the short-range communications system 1020 includes an infrared device and associated circuits and components or a Radio Frequency based communication module such as one supporting Bluetooth® communications, to provide for communication with similarly-enabled systems and devices, including the data file transfer communications described above.
- the short-range communications system is also able to include one or more of components to support communications over wireless links such as Wi-Fi®, Near Field Communications (NFC), any other short range link, or combinations of these
- a media reader 1060 is able to be connected to an auxiliary I/O device 1038 to allow, for example, loading computer readable program code of a computer program product into the electronic device 1052 for storage into flash memory 1006 .
- a media reader 1060 is an optical drive such as a CD/DVD drive, which may be used to store data to and read data from a computer readable medium or storage product such as computer readable storage media 1062 .
- suitable computer readable storage media include optical storage media such as a CD or DVD, magnetic media, or any other suitable data storage device.
- Media reader 1060 is alternatively able to be connected to the electronic device through the Data port 1028 or computer readable program code is alternatively able to be provided to the electronic device 1052 through the wireless network 1050 .
- the principles described above are able to be realized as a computer readable storage medium having computer readable program code embodied therewith.
- the computer readable program code in an example comprising instructions for: receiving a message comprising presentable data defining presentable content; determining a presence of a privacy indication token within the presentable data; and applying, based on determining the presence of the privacy indication token within the presentable data, a presentation privacy filter to presentations of the presentable content.
- the present subject matter can be realized in hardware, software, or a combination of hardware and software.
- a system can be realized in a centralized fashion in one computer system, or in a distributed fashion where different elements are spread across several interconnected computer systems. Any kind of computer system—or other apparatus adapted for carrying out the methods described herein—is suitable.
- a typical combination of hardware and software could be a general purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein.
- Computer program in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following a) conversion to another language, code or, notation; and b) reproduction in a different material form.
- Each computer system may include, inter alia, one or more computers and at least a computer readable medium allowing a computer to read data, instructions, messages or message packets, and other computer readable information from the computer readable medium.
- the computer readable medium may include non-transitory computer readable storage medium embodying non-volatile memory, such as read-only memory (ROM), flash memory, disk drive memory, CD-ROM, and other permanent storage. Additionally, a computer medium may include volatile storage such as RAM, buffers, cache memory, and network circuits.
- the computer readable medium may comprise computer readable information in a transitory state medium such as a network link and/or a network interface, including a wired network or a wireless network, that allow a computer to read such computer readable information.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- User Interface Of Digital Computer (AREA)
- Telephonic Communication Services (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims (19)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/453,537 US10754965B2 (en) | 2017-03-08 | 2017-03-08 | Data messaging with privacy tokens |
EP18157473.2A EP3373185B1 (en) | 2017-03-08 | 2018-02-19 | Data messaging with privacy tokens |
CN201810188847.5A CN108573163B (en) | 2017-03-08 | 2018-03-07 | Data messaging with privacy tokens |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/453,537 US10754965B2 (en) | 2017-03-08 | 2017-03-08 | Data messaging with privacy tokens |
Publications (2)
Publication Number | Publication Date |
---|---|
US20180260577A1 US20180260577A1 (en) | 2018-09-13 |
US10754965B2 true US10754965B2 (en) | 2020-08-25 |
Family
ID=61580912
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/453,537 Active 2037-08-06 US10754965B2 (en) | 2017-03-08 | 2017-03-08 | Data messaging with privacy tokens |
Country Status (3)
Country | Link |
---|---|
US (1) | US10754965B2 (en) |
EP (1) | EP3373185B1 (en) |
CN (1) | CN108573163B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11553157B2 (en) | 2016-10-10 | 2023-01-10 | Hyperconnect Inc. | Device and method of displaying images |
US10346223B1 (en) | 2016-11-23 | 2019-07-09 | Google Llc | Selective obfuscation of notifications |
KR101932844B1 (en) | 2017-04-17 | 2018-12-27 | 주식회사 하이퍼커넥트 | Device and method of making video calls and method of mediating video calls |
KR102266888B1 (en) * | 2018-12-31 | 2021-06-21 | 주식회사 하이퍼커넥트 | Terminal and server providing a video call service |
KR102282963B1 (en) | 2019-05-10 | 2021-07-29 | 주식회사 하이퍼커넥트 | Mobile, server and operating method thereof |
KR102311603B1 (en) | 2019-10-01 | 2021-10-13 | 주식회사 하이퍼커넥트 | Mobile and operating method thereof |
KR102293422B1 (en) | 2020-01-31 | 2021-08-26 | 주식회사 하이퍼커넥트 | Mobile and operating method thereof |
CN111638978B (en) * | 2020-05-20 | 2023-11-14 | 北京达佳互联信息技术有限公司 | Content sharing method and device |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5801697A (en) | 1993-10-12 | 1998-09-01 | International Business Machine Corp. | Method and apparatus for preventing unintentional perusal of computer display information |
US6757713B1 (en) | 1998-09-23 | 2004-06-29 | John W. L. Ogilvie | Method for including a self-removing indicator in a self-removing message |
US7779475B2 (en) * | 2006-07-31 | 2010-08-17 | Petnote Llc | Software-based method for gaining privacy by affecting the screen of a computing device |
US7912908B2 (en) | 2006-03-27 | 2011-03-22 | Alcatel-Lucent Usa Inc. | Electronic message forwarding control |
US20130179985A1 (en) * | 2012-01-05 | 2013-07-11 | Vmware, Inc. | Securing user data in cloud computing environments |
US8781838B2 (en) | 2010-08-09 | 2014-07-15 | General Motors, Llc | In-vehicle text messaging experience engine |
US20140201527A1 (en) | 2013-01-17 | 2014-07-17 | Zohar KRIVOROT | Systems and methods for secure and private delivery of content |
US8844028B1 (en) * | 2007-12-28 | 2014-09-23 | Trend Micro Inc. | Arrangement and methods for performing malicious data detection and information leakage prevention |
US8856948B1 (en) * | 2013-12-23 | 2014-10-07 | Google Inc. | Displaying private information on personal devices |
WO2015148441A1 (en) | 2014-03-26 | 2015-10-01 | Amazon Technologies, Inc. | Electronic communication with secure screen sharing of sensitive information |
US20150371049A1 (en) * | 2014-06-24 | 2015-12-24 | Brandon Oliver Xavier | Systems, methods and devices for providing visual privacy to messages |
US20160261532A1 (en) | 2015-03-06 | 2016-09-08 | Unify Gmbh & Co. Kg | Method, Device, and System for Providing Privacy for Communications |
US20160360152A1 (en) | 2012-04-26 | 2016-12-08 | Unify Gmbh & Co. Kg | Content Security for a Mobile Communication Terminal |
US9558365B1 (en) | 2015-12-22 | 2017-01-31 | Kirigami, LLC | Systems and methods for creating and sharing protected content |
US20180121397A1 (en) * | 2016-11-02 | 2018-05-03 | Blackberry Limited | Text obfuscation |
US10263970B1 (en) * | 2018-10-07 | 2019-04-16 | Capital One Services, Llc | System, method and architecture for secure sharing of customer intelligence |
-
2017
- 2017-03-08 US US15/453,537 patent/US10754965B2/en active Active
-
2018
- 2018-02-19 EP EP18157473.2A patent/EP3373185B1/en active Active
- 2018-03-07 CN CN201810188847.5A patent/CN108573163B/en active Active
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5801697A (en) | 1993-10-12 | 1998-09-01 | International Business Machine Corp. | Method and apparatus for preventing unintentional perusal of computer display information |
US6757713B1 (en) | 1998-09-23 | 2004-06-29 | John W. L. Ogilvie | Method for including a self-removing indicator in a self-removing message |
US7912908B2 (en) | 2006-03-27 | 2011-03-22 | Alcatel-Lucent Usa Inc. | Electronic message forwarding control |
US7779475B2 (en) * | 2006-07-31 | 2010-08-17 | Petnote Llc | Software-based method for gaining privacy by affecting the screen of a computing device |
US8844028B1 (en) * | 2007-12-28 | 2014-09-23 | Trend Micro Inc. | Arrangement and methods for performing malicious data detection and information leakage prevention |
US8781838B2 (en) | 2010-08-09 | 2014-07-15 | General Motors, Llc | In-vehicle text messaging experience engine |
US20130179985A1 (en) * | 2012-01-05 | 2013-07-11 | Vmware, Inc. | Securing user data in cloud computing environments |
US20160360152A1 (en) | 2012-04-26 | 2016-12-08 | Unify Gmbh & Co. Kg | Content Security for a Mobile Communication Terminal |
US20140201527A1 (en) | 2013-01-17 | 2014-07-17 | Zohar KRIVOROT | Systems and methods for secure and private delivery of content |
US8856948B1 (en) * | 2013-12-23 | 2014-10-07 | Google Inc. | Displaying private information on personal devices |
WO2015148441A1 (en) | 2014-03-26 | 2015-10-01 | Amazon Technologies, Inc. | Electronic communication with secure screen sharing of sensitive information |
US20150371049A1 (en) * | 2014-06-24 | 2015-12-24 | Brandon Oliver Xavier | Systems, methods and devices for providing visual privacy to messages |
US9235711B1 (en) | 2014-06-24 | 2016-01-12 | Voxience S.A.R.L. | Systems, methods and devices for providing visual privacy to messages |
US20160261532A1 (en) | 2015-03-06 | 2016-09-08 | Unify Gmbh & Co. Kg | Method, Device, and System for Providing Privacy for Communications |
US9558365B1 (en) | 2015-12-22 | 2017-01-31 | Kirigami, LLC | Systems and methods for creating and sharing protected content |
US20180121397A1 (en) * | 2016-11-02 | 2018-05-03 | Blackberry Limited | Text obfuscation |
US10263970B1 (en) * | 2018-10-07 | 2019-04-16 | Capital One Services, Llc | System, method and architecture for secure sharing of customer intelligence |
Non-Patent Citations (4)
Title |
---|
Asterino, M., "How Do I Send Disappearing Messages on my iPhone? Invisible Ink!", Sep. 10, 2016 (https://www.payetteforward.com/how-do-i-send-disappearing-messages-on-my-iphone-invisible-ink/, pp. 1-3.). |
Communication pursuant to article 94(3) EPC issued for European Application No. 18157473.2 dated Apr. 25, 2019. |
Communication pursuant to article 94(3) EPC issued for European Application No. 18157473.2 dated Oct. 1, 2019. |
Extended European Search Report for European Application No. 18157473.2 dated Jun. 7, 2018. |
Also Published As
Publication number | Publication date |
---|---|
CN108573163A (en) | 2018-09-25 |
CN108573163B (en) | 2023-10-20 |
US20180260577A1 (en) | 2018-09-13 |
EP3373185B1 (en) | 2020-12-02 |
EP3373185A1 (en) | 2018-09-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10754965B2 (en) | Data messaging with privacy tokens | |
US10387675B2 (en) | Indirect indications for applying display privacy filters | |
US9898592B2 (en) | Application marketplace administrative controls | |
US9106598B2 (en) | Enhanced privacy and control features for an electronic message | |
CN106713116B (en) | Information processing method, apparatus and system | |
KR101802759B1 (en) | Mobile terminal and Method for controlling display thereof | |
US8856223B2 (en) | Limiting access to instant messaging content on a display screen | |
US8918083B2 (en) | System and method to manage visual voice mail messages | |
US20160103608A1 (en) | Virtual keyboard of a computing device to create a rich output and associated methods | |
KR101917696B1 (en) | Mobile terminal and control method thereof | |
KR20120049757A (en) | Method for displaying augmented reality information and mobile terminal using this method | |
CN104378503A (en) | Method, device and terminal avoiding information display leakage | |
CN108762627A (en) | Instant message display methods and terminal | |
WO2018081257A1 (en) | Filters for selecting alphabet of characters presented by keyboard | |
US20120001748A1 (en) | Methods and apparatus for visually supplementing a graphical user interface | |
US20110081018A1 (en) | Obfuscating reception of communiqué affiliated with a source entity | |
KR20050034362A (en) | Wireless communication terminal and its method of protecting screen information | |
US20170337388A1 (en) | Data security using alternative encoding | |
JP2006133595A (en) | Information processor and method for controlling display thereof | |
CA2654436A1 (en) | A listing for received messages | |
KR100765953B1 (en) | A mobile communication terminal providing a privacy protection function and character message displaying method using there of | |
US11876761B2 (en) | Systems and methods for visual cue based messaging | |
CN106648346A (en) | Method for sending message and terminal | |
Smith | Sams teach yourself iPad in 10 minutes | |
JP2005191774A (en) | Portable terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BLACKBERRY LIMITED, CANADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ADAMS, NEIL PATRICK;KOMINAR, JEREMY LAWSON;REEL/FRAME:041508/0844 Effective date: 20170307 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: MALIKIE INNOVATIONS LIMITED, IRELAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BLACKBERRY LIMITED;REEL/FRAME:064104/0103 Effective date: 20230511 |
|
AS | Assignment |
Owner name: MALIKIE INNOVATIONS LIMITED, IRELAND Free format text: NUNC PRO TUNC ASSIGNMENT;ASSIGNOR:BLACKBERRY LIMITED;REEL/FRAME:064271/0199 Effective date: 20230511 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |